W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman
{"title":"Secure and Robust Optical Multi-Stage Medical Image Cryptosystem","authors":"W. El-shafai, M. Aly, A. Algarni, F. El-Samie, N. Soliman","doi":"10.32604/cmc.2022.018545","DOIUrl":"https://doi.org/10.32604/cmc.2022.018545","url":null,"abstract":": Due to the rapid growth of telemedicine and healthcare services, color medical image security applications have been expanded precipitously. In this paper, an asymmetric PTFrFT (Phase Truncated Fractional Fourier Transform)-based color medical image cryptosystem is suggested. Two different phases in the fractional Fourier and output planes are provided as deciphering keys. Accordingly, the ciphering keys will not be employed for the deciphering procedure. Thus, the introduced PTFrFT algorithm comprises asymmetric ciphering and deciphering processes in contrast to the traditional optical symmetric OSH (Optical Scanning Holography) and DRPE (Double Random Phase Encoding) algorithms. One of the principal impacts of the introduced asymmetric cryptosystem is that it eliminates the one-dimensionality aspects of the related symmetric cryptosystems due to its remarkable feature of phase nonlinear truncation components. More comparisons on various color medical images are examined and analyzed to substanti-ate the cryptosystem efficacy. The achieved experimental outcomes ensure that the introduced cryptosystem is robust and secure. It has terrific cryptography performance compared to conventional cryptography algorithms, even in the presence of noise and severe channel attacks.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"35 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78866022","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design of an Information Security Service for Medical Artificial Intelligence","authors":"Yanghoon Kim, Jawon Kim, Hangbae Chang","doi":"10.32604/cmc.2022.015610","DOIUrl":"https://doi.org/10.32604/cmc.2022.015610","url":null,"abstract":": The medical convergence industry has gradually adopted ICT devices, which has led to legacy security problems related to ICT devices. However, it has been difficult to solve these problems due to data resource issues. Such problems can cause a lack of reliability in medical artificial intelligence services that utilize medical information. Therefore, to provide reliableservices focused on security internalization,it is necessary to establish a medical convergence environment-oriented security management system. This study proposes the use of system identification and countermeasures to secure system reliability when using medical convergence environment informationin medical artificial intelligence. We checked the life cycle of medical information and the flow and location of information, analyzed the security threats that may arise during the life cycle, and proposed technical countermeasures to overcome such threats. We verified the proposed countermeasures through a survey of experts. Security requirements were defined based on the information life cycle in the medical convergence environment. We also designed technical countermeasures for use in the security management systems of hospitals of diverse sizes.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"29 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78953146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally
{"title":"Cluster-Based Stable BSM Dissemination System for Safe Autonomous Platooning","authors":"Sagheer Abbas, Yousef Alhwaiti, A. Fatima, M. A. Khan, Muhammad Adnan Khan, Taher M. Ghazal, Asma Kanwal, Munir Ahmad, Nouh Sabri Elmitwally","doi":"10.32604/cmc.2022.021237","DOIUrl":"https://doi.org/10.32604/cmc.2022.021237","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"13 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79022672","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved KNN Imputation for Missing Values in Gene Expression Data","authors":"Phimmarin Keerin, Tossapon Boongoen","doi":"10.32604/cmc.2022.020261","DOIUrl":"https://doi.org/10.32604/cmc.2022.020261","url":null,"abstract":"The problem of missing values has long been studied by researchers working in areas of data science and bioinformatics, especially the analysis of gene expression data that facilitates an early detection of cancer. Many attempts show improvements made by excluding samples with missing information from the analysis process, while others have tried to fill the gaps with possible values. While the former is simple, the latter safeguards information loss. For that, a neighbour-based (KNN) approach has proven more effective than other global estimators. The paper extends this further by introducing a new summarizationmethod to theKNNmodel. It is the first study that applies the concept of ordered weighted averaging (OWA) operator to such a problem context. In particular, two variations of OWA aggregation are proposed and evaluated against their baseline and other neighbor-based models. Using different ratios of missing values from 1%–20% and a set of six published gene expression datasets, the experimental results suggest that newmethods usually provide more accurate estimates than those compared methods. Specific to the missing rates of 5% and 20%, the best NRMSE scores as averages across datasets is 0.65 and 0.69, while the highest measures obtained by existing techniques included in this study are 0.80 and 0.84, respectively.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"1 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76532644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai
{"title":"Autism Spectrum Disorder Prediction by an Explainable Deep Learning Approach","authors":"Jasmin Pamela S, R. Saranya, V. Indragandhi, R. Raja Singh, V. Subramaniyaswamy, Yuvaraja Teekaraman, S. Urooj, N. Alwadai","doi":"10.32604/cmc.2022.022170","DOIUrl":"https://doi.org/10.32604/cmc.2022.022170","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"118 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77390388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim
{"title":"Design of Human Adaptive Mechatronics Controller for Upper Limb Motion Intention Prediction","authors":"Sunwoo Hwang, Joo-Uk Kim, Hagseoung Kim, Hyungchul Kim, Youngmin Kim","doi":"10.32604/cmc.2022.021667","DOIUrl":"https://doi.org/10.32604/cmc.2022.021667","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"33 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79085807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin
{"title":"Development of PCCNN-Based Network Intrusion Detection System for EDGE Computing","authors":"Kamaledin Abodayeh, A. Raza, Muhammad Rafiq, Muhammad Shoaib Arif, Muhammad Naveed, Zunir Zeb, Syed Zaheer Abbas, K. Shahzadi, S. Sarwar, Qasim Naveed, Badar Ul Zaman, Muhammad Mohsin","doi":"10.32604/cmc.2022.018708","DOIUrl":"https://doi.org/10.32604/cmc.2022.018708","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"46 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79254994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim
{"title":"Blockchain Based Secured Load Balanced Task Scheduling Approach for Fitness Service","authors":"Muhammad Ibrahim, Faisal Jamil, Yunjung Lee, Dohyeun Kim","doi":"10.32604/cmc.2022.019534","DOIUrl":"https://doi.org/10.32604/cmc.2022.019534","url":null,"abstract":": In recent times, the evolution of blockchain technology has got huge attention from the research community due to its versatile applications and unique security features. The IoT has shown wide adoption in various applications including smart cities, healthcare, trade, business, etc. Among these applications, fitness applications have been widely considered for smart fitness systems. The users of the fitness system are increasing at a high rate thus the gym providers are constantly extending the fitness facilities. Thus, scheduling such a huge number of requests for fitness exercise is a big challenge. Secondly, the user fitness data is critical thus securing the user fitness data from unauthorized access is also challenging. To overcome these issues, this work proposed a blockchain-based load-balanced task scheduling approach. A thorough analysis has been performed to investigate the applications of IoT in the fitness industry and various scheduling approaches. The proposed scheduling approach aims to schedule the requests of the fitness users in a load-balanced way that maximize the acceptance rate of the users’ requests and improve resource utilization. The performance of the proposed task scheduling approach is compared with the state-of-the-art approaches concerning the average resource utilization and task rejection ratio. The obtained results confirm the efficiency of the proposed scheduling approach. For investigating the performance of the blockchain, various experiments are performed using the Hyperledger Caliper concerning latency, throughput, resource utilization. The Solo approach has shown an improvement of 32% and 26% in throughput as compared to Raft and Solo-Raft approaches respectively. The obtained results assert that the proposed architecture is applicable for resource-constrained IoT applications and is extensible for different IoT applications.","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"231 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86690750","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya
{"title":"Unprecedented Smart Algorithm for Uninterrupted SDN Services During DDoS Attack","authors":"M. R. Haque, S. C. Tan, Z. Yusoff, K. Nisar, R. Kaspin, Iram Haider, Sana Nisar, J. Rodrigues, B. S. Chowdhry, M. A. Uqaili, Satya Prasad Majumder, D. Rawat, Richard Etengu, R. Buyya","doi":"10.32604/cmc.2022.018505","DOIUrl":"https://doi.org/10.32604/cmc.2022.018505","url":null,"abstract":"","PeriodicalId":10440,"journal":{"name":"Cmc-computers Materials & Continua","volume":"61 1","pages":""},"PeriodicalIF":3.1,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86990797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}